Master Resource-ID Concept Specification
|
|
- Diana Jordan
- 5 years ago
- Views:
Transcription
1 Master Resource-ID Concept Specification Prepared By NERC DEWG Station Naming Focus Team Version 3.0 November 10, 2002
2 Document Revision Log Revision # Revision Date Revision Description November 6,
3 Table of Contents EXECUTIVE SUMMARY...4 OBJECTIVES OF COMMON NAMING FOR SUBSTATIONS...4 STATEMENT OF NEED...4 EXPLANATION OF STATEMENT OF NEED...4 DEFINITIONS...5 SPECIFICATION FOR THE MASTER RESOURCE ID (MRID)...6 SPECIFICATION FOR THE SUBSTATION RESOURCE ID (SRID)...6 RELATED MASTER RESOURCE REGISTRY REGISTRY REGISTRY ATTRIBUTES PROPOSED ADMINISTRATIVE ATTRIBUTES PROPOSED PHYSICAL SUBSTATION ATTRIBUTES PROPOSED EMS ATTRIBUTES EXAMPLE...9 SECURITY...9 FUNCTIONALITY...10 SUGGESTION FUTURE PLANS November 6,
4 Executive Summary MASTER RESOURCE ID Concept Specification (A Reference Designation System) This specification defines an approach for globally providing and formulating unambiguous reference designations for Electrical Power System objects defined within the EPRI Common Information Model (CIM). This document initially defines the requirements for a unique identifier for a Substation but is not limited to the CIM class of Substations. Other objects, defined within the CIM, could have unique identifiers if needed. Objectives of Common Naming for Substations To provide the capability of merging models with unique/unambiguous and persistent substation names. Given this uniqueness in the substation names, then any power system element can be assured to be unique with relation to the substation. To provide a cross reference to real time data, bus names, and results of planning models. To help assure integrity of data models as physical changes are made. To provide an implementation which is scalable beyond the substation level to accommodate future use. Statement of Need Some Utilities have begun to solve the naming cross-reference by their own means, when internally building their State Estimator (SE) models for Security Coordination. Models go beyond their region and the outside is based on the planning model which months of manually embellishing and linking to ICCP have been done. Once the CIM/XML translation is available and utilized by the utilities, Company s will work to incorporate SE models from neighboring systems. There will be a need to cross-reference the SE names with the company s existing names with real Resource Ids (MRID) or each utility will need to design and develop their own internal/external modeling cross referencing method, which would indeed create a large maintenance and updating nightmare. CCAPI has a Resource Naming Group that is looking at using URIs and namespaces to accomplish a global naming and advance this as a standard through the IEC. MRID proposal is needed to implement a unique, vendor-neutral, open model naming specification, which can support the many business processes that are converging upon the base of the Common Information Model (CIM). Explanation of Statement of Need 4.1 Substations names, such as Airport Substation, may be referenced by the same name in several companies. When Company A is exchanging information about Substations to Company B, the Substations must be uniquely identified while maintaining the ownership and other information about the substation. In addition, it is important that the receiving entity of the information be able to identify whether the Substations with the same name are physically different or if two Substations with different names are, in effect, the same. November 6,
5 4.2 This specification provides solutions for the following problems: Definitions 1) When a Substation name is changed. a. Is this a new substation or just a name change? b. If the name was changed, what was the previous name? 2) When one company (source) has multiple names for a single Substation. a. What are the usage contexts for the various names? b. Are the various reference names associated with the physical substation? 3) When two companies, divisions, or sources have the same Substation name. a. Do the names refer to the same Substation or different Substations? 4) When two companies, divisions or sources have different names for Substations. a. Do the different names refer to the same or different Substations? 5) When the Substation is decommissioned or taken out of service. a. Is there still a Substation? b. If one or more of the reference names is later used, is it the same (out of service substation or a new one? 6) Automatic display building of Substations a. When to relink a display or build the display for a new or different Substation? 7) Terminology talking to other users using a commonly understood name. 8) Sometimes work is duplicated because one change affects multiple applications. 1. Fence Name: One possible Master Resource ID (MRID) alias of a substation using the substation name typically identified on the substation perimeter fence. 2. FIPS: Federal Information Processing System is a standardization of codes used by the United States Federal Government for the identification of states, counties and selected cities ISN: Inter-regional Security Network. The communications network used to exchange data amongst NERC and the Security Coordinators. 4. ISN DDF: The ISN Data Definition File. A comma-separated-value text file that defines the attributes of each measurement value exchanged via ICCP. This information includes the ICCP Object ID, substation (location) and device identification, data collection sources and rates, and other identifying data. 5. Logical Name: See MRID Alias. 6. Map Name: One possible MRID alias of a substation using the substation name used on a company s transmission system or station one-line diagram. 7. Master Resource ID (MRID): A unique identifier that can be constructed for any Power System Resource defined in the CIM. 8. Master Resource Registry: A repository that contains IDs for any Power System Resource defined in the CIM. 9. MMWG: Multi-regional Modeling Working Group, a working group within NERC that has been annually coordinating to merge large load flow study models for many years. 10. Model Alias: A modeler s reference to a particular power system resource, such as a substation, bus, line, or transformer, as might be used in a planning model, SCADA, or state estimator model. 11. MRID Alias: A human readable resource identifier, such as the substation fence name or the EMS SCADA substation name, that is associated with the unique MRID. Multiple aliases may be associated with the same MRID and thus the same resource. November 6,
6 12. Registration Authority (RA): An entity (Control Area, Security Coordinator, Region, etc.) authorized to register Power System Resources defined in the CIM. Authority is granted by the organization (NERC (NAERO)) overseeing the Registry. 13. Substation Resource ID (SRID): A unique identifier representing one instance of a Substation. A Substation unique identifier will be in the Substation Resource Registry. 14. Substation Resource Registry: A section of the Master Resource Registry that contains a set of unique identifiers for instances of Substations. 15. Unique Identifier: An unambiguous reference to a specific Power System Resource defined in the CIM. 16. Usage Context: A key part of an alias identifier that identifies the user alias as opposed to the owner alias. For example: Two companies having the same substation defined in their respective systems. Usage Context discriminates between the two EMS names based on the user of the information. Specification for the Master Resource ID (MRID) In connection with the Common Information Model (CIM), it is necessary to employ a reference designation system to be used for identification of Power System Resources within the CIM. A Master Registry will contain the unique identifiers for CIM objects. The immediate need is a unique identifier for Substations. However, the reference identification system can provide other unique identifiers for other objects in the CIM classes. An extension of unique identifiers for other CIM objects would allow a network model and an asset model to work together. The MRID provides a unique identifier for an instance of a Power System Resource (psr). The MRID is an underscore-delimited string in the form: psrtype_org_reg_psrx where psrtype represents any power system resource type, such as a substation. org represents the code identifier of the organization defining the registration authorities. reg represents the Registration Authority ID (RAID) code of the initial RA. psrx represents a unique identifier established by the registration authority. The ID itself is a human readable ASCII string representation of the Identifier. ASCII, as used here refers to the representation as opposed to a binary or non-printable representation. The actual identifier will be a hexadecimal number in the ASCII representation. The 'psrtype' is a four character mnemonic, all uppercase, identifying the specific resource type. (Consistent with IEC and IEC ) The org code is a numeric string of one to three characters. Org code 1 is reserved for ISO, org code 2 is reserved for IEC, and org code 3 is reserved for NERC (NAERO). The reg code is a string of hexadecimal digits (0-F), with no special characters, a maximum of four characters. It is assigned by the org. The psrx is a string of hexadecimal digits (0-F), with no special characters, a null terminated string up to 32 characters in length. The 32 maximum character length allows for Control Area subdivision if desired. The org creating the MRID can define the psrx value, as it desires. Specification for the Substation Resource ID (SRID) The MID provides a unique identifier for an instance of a Substation. The MID is a unique identification string for an individual Substation. However other devices defined within an November 6,
7 organization can also have a unique identifier. The unique MID is created programmatically by the MID system and correlates the MID to the name entries and their attributes. In this proposal the only unique identifier to be constructed is for instances of Substations. However, other devices within the organization can use the same process to obtain a unique identifier. Upon entry of a new substation entry, a utility program tool generates a unique ID and writes it to the Master Registry for use by other programs. Once the record for a Substation is entered into the Registry, any user of the system may change the logical name (alias) they have entered without affecting the ID. The programs currently using the ID do not have to be changed; however, the new logical name would be displayed or used by these programs without any code changes or naming manipulations by the user. In fact, the user would not have to know the logical name or alias used within the program had ever changed. The psrtype for a substation is "ZSUB". Example: ZSUB_3_12AF_ ABCDEF ABCDEF where 3 is NERC (NAERO) 12AF is a NERC-Assigned Registration Authority ID (in Hex) ABCDEF ABCDEF is an ID unique for each substation The example above shows the maximum length Substation ID for NERC (NAERO). Related Master Resource Registry 8.1 Registry The single most important technique in managing MRIDs is to keep a common list that can be accessed by all entities as required. A central database containing all MRIDs for Substations makes it easy to keep track of MRIDs and the companies managing the MRIDs. The Registry provides a single repository for all Substation unique identifiers (SRIDs). As companies require a SRID for their Substation, they can access the system and enter a new substation name. The system assigns a Master Substation Resource ID. The user can then enter all known attributes about that substation. Attributes include the name of the Substation as defined by the owner, the highest voltage level contained in the substation, the company that owns the substation, the division, and any other properties related to the substation. Once the substation and attributes are entered, the user can then enter one or more valid aliases for that substation. Other persons or organizations can add additional aliases as required to produce a cross-reference of this substation name to other names used by other entities within the industry. List of requirements the MRID would provide: 1) The system shall be capable of being consistently applied to all instances of Substation objects. November 6,
8 2) The system shall provide the ability to identify unambiguously any instance of a single Substation object. 3) The system shall support the unique identifier even if other objects from organizations, companies, divisions, or departments have the same name and the same name will not change the original identifier. 4) The system shall support use of attributes to identify the specific substation. Sample attributes may include Company, Division, location, previous name, person or organization entering the name or alias, etc. 5) The system should support the use of and should be able to be implemented by computer-aided tools. 6) The system shall contain rules for the creation of a unique identifier. 7) The system shall maintain its given unique identifier within a system when this system is incorporated into a larger system. 8) The system shall allow a logical name change without affecting the unique Substation identifier. 8.2 Registry Attributes Proposed Registry attributes might include the following to capture administrative as well as physical and/or system attributes: Proposed Administrative attributes: - Current Registration Authority - Create Date - Update Date - Retire Date - Commission Date - Decommission Date - Person Who Performed Update Proposed Physical substation attributes: - Usage Context (Required Must be "PHY" for Physical) - Operating Authority (Required) - Registered Site ID (Required) - Map Name (Required) - Station # (Optional) - State/Province (Required) (for US/Canada 2 character abbreviation, for Mexico up to 4 characters) - County/Parish/City (Required) (for US only as listed in current FIPS PUB) - Longitude (Optional) - Latitude (Optional) - Altitude (Optional) Proposed EMS attributes: - Usage Context (Required Must be "EMS") - Model Owner (Required) - Registered Site ID (Required) - First Tier Breakout (Division/Region/Oper Co./District) (Required) - Substation Name (Required) November 6,
9 - Voltage Level (Highest Voltage in kv owned by RSID) (Required) 8.3 Example Security For jointly owned substations, the owners will need to decide who is the Registration Authority. Decision could be based on owner of highest voltage. This proposal gives the flexibility for a company to register Substation Resource IDs locally so work can proceed without delay. There must be a common file format provided at import. Recommended file format is csv. Substations where there is joint ownership, the joint owners will need to get together and decide who is the primary owner. Could possibly make the decision based on owner of highest voltage. This proposal gives the flexibility of a company going ahead and registering locally so work can proceed without delay. An example of possible uses of these attributes for two different users might be as follows: Minimum requirement for data exchange (Usage Context <USE>/Model Owner <MO>/Registered Site ID <RSID>/ First Tier <FT>/Substation Name <SUBSTN>/Voltage Level <VL>). Sample EMS attributes USE MO RSID FT/DIV SUBSTN VL EMS EES EES APL BAILEY 115 EMS SWP EES APL BAILEY2 115 EES Entergy SWP Southwest Power Pool APL Entergy/Arkansas (Arkansas Power & Light) 9.1 The MRID system would employ the following security measures: 1. The system would restrict changes by users to those that entered the logical name or alias for that record. 2. A Log-In would be required to use the system. 3. Provide back up and restore as well as downloading procedures within the system. November 6,
10 Full and complete security/access controls will be provided in the implementation specification to be produced and approved by DEWG. Functionality 10.1 The following minimum functionality must be provided: 1. Automatically assign a Master ID 2. Provide multiple cross-references between the Master ID and various logical names or aliases 3. Allow the modification of a logical name or its attributes 4. Provide user security levels to prevent modification of the logical name or alias by other parties. 5. Provide wildcarding across all logical names. 6. Provide a mechanism to batch load the logical names 7. Provide an interactive maintenance capability to locate and change, add or delete the logical names. 8. Allow authorized editing of all logical names (not the Master ID) 9. Maintain the historical names for new or changed names last three names 10. Provide facility to associate attributes with each logical name. 11. Provide Query capability for Software Vendors partial or full downloads 12. Provide a facility to notify all owners of logical names in the event of a change or deletion of an associated logical name or attribute. 13. Maintain the historical attributes for the last 3 historical names specified in number 9 above. 14. Maintain a contact list of Operating Authorities within the system. The initial proposed site for implementation of the system is at NERC. Suggestion: NERC-hosted site publishers and subscribers would mutually benefit and so a symbiosis would exist. Future Plans: Combine with the NERC Registry. NERC Registry task force would incorporate the MRID proposal into an RFP. November 6,
Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities
Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities This Implementation Plan applies to Cyber Security Standards CIP-002-2 through CIP-009-2 and CIP-002-3 through
More informationImplementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities
Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities This Implementation Plan applies to Cyber Security Standards CIP-002-2 through CIP-009-2 and CIP-002-3 through
More informationCIP Version 5 Evidence Request User Guide
CIP Version 5 Evidence Request User Guide Version 1.0 December 15, 2015 NERC Report Title Report Date I Table of Contents Preface... iv Introduction... v Purpose... v Evidence Request Flow... v Sampling...
More informationImplementation Plan. Project CIP Version 5 Revisions. January 23, 2015
Implementation Plan Project 2014-02 CIP Version 5 Revisions January 23, 2015 This Implementation Plan for the Reliability Standards developed as part of Project 2014-02 CIP Version 5 Revisions replaces
More informationImplementation Plan. Project CIP Version 5 Revisions 1. January 23, 2015
Implementation Plan Project 2014-02 CIP Version 5 Revisions January 23, 2015 This Implementation Plan for the Reliability Standards developed as part of Project 2014 02 CIP Version 5 Revisions replaces
More informationCritical Asset Identification Methodology. William E. McEvoy Northeast Utilities
Critical Asset Identification Methodology William E. McEvoy Northeast Utilities Disclaimer This NPCC TFIST workshop provides a forum for the presentation and discussion of member experience in the implementation
More informationUnofficial Comment Form Project Disturbance Monitoring
Unofficial Comment Form Project 2007-11 Disturbance Monitoring Please DO NOT use this form for submitting comments. Please use the electronic form to submit comments on the Standard Authorization Request
More informationStandard CIP Cyber Security Critical Cyber As s et Identification
A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification
More informationStandard CIP Cyber Security Critical Cyber As s et Identification
A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification
More informationDisclaimer Executive Summary Introduction Overall Application of Attachment Generation Transmission...
CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document September, 2010 Table of Contents TABLE OF CONTENts Disclaimer... 3 Executive Summary... 4 Introduction...
More informationProposal for Development and Use of Node- Breaker Topology Representations for Offline and Real-time Study Models November 12, 2013
Proposal for Development and Use of Node- Breaker Topology Representations for Offline and Real-time November 12, 2013 Rationale Background Interconnection wide powerflow and dynamics cases are currently
More informationTransmission Register PTO Admin User Manual. Version 1.0
Transmission Register PTO Admin User Manual Version 1.0 Table of Contents 1. INTRODUCTION... 3 1.1. Purpose...3 1.2. Scope...3 1.3. Definitions...3 2. COMPONENTS HOMEPAGE... 6 2.1. Find Components...6
More informationDate adopted/approved 02/08/2013 Custodian (entity responsible for maintenance and upkeep) Data Exchange Work Group. Web URL: Previous name/number
Document name Category Guideline for WECC Operations Network Node: Responsibilities and Procedures ( ) Regional Reliability Standard ( ) Regional Criteria ( ) Policy (X) Guideline ( ) Report or other (
More informationConcept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities
Concept White Paper Concepts for Proposed Content of Eventual Standard(s) for Project 2009-02: Real-Time Monitoring and Analysis Capabilities Real-time Monitoring and Analysis Capabilities Standard Drafting
More informationAssociation Information Exchange Form
Association Information Exchange Form The attached ICCP Association Information Exchange Form has been created to facilitate ICCP associations between ICCP nodes. All fields are required to create an association.
More informationBuilding a Topology Estimator for Large Inter-regional Networks
Building a Topology Estimator for Large Inter-regional Networks ETREP02.pdf Robin Podmore *, Margaret Goodrich**, David Becker***, Peter Hirsch***, Stephen Lee ***, Marck Robinson**** robin@incsys.com,
More informationCIP Substation Security Project Update
CIP Substation Security Project Update VELCO OPERATING COMMITTEE MAY 15, 2014 5/14/2014 1 CIP Substation Security Project Update 2013 Security Project Activities/Accomplishments NERC CIP - Version 5 Compliance
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationProject Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives
Project 2014-02 - Cyber Security - Order No. 791 Identify, Assess, and Correct; Low Impact; Transient Devices; and Communication Networks Directives Violation Risk Factor and Justifications The tables
More informationWON Security Guideline
WON Security Guideline Data Exchange Work Group October 7, 2015 155 rth 400 West, Suite 200 Salt Lake City, Utah 84103-1114 WON Security Guideline 1 Table of Contents Purpose... 1 Background... 1 Security
More informationPhysical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,
More informationUnofficial Comment Form
Generator Requirements at the Transmission Interface (Project 2010-07) Please DO NOT use this form to submit comments. Please use the electronic comment form to submit comments on the first formal posting
More informationCIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security System Security Management 2. Number: CIP-007-5 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in
More informationDRAFT Reliability Standard Audit Worksheet 1
DRAFT Reliability Standard Audit Worksheet 1 PRC-025-2 Generator Relay Loadability This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR Number: Compliance
More informationOperating Reliability Subcommittee Presentations. February 10-11, 2015
Operating Reliability Subcommittee Presentations February 10-11, 2015 Presentation 1 ORS February 10, 2015 EInet Transition Efforts All current RC nodes on NERCNet have placed orders for new network EIDSN
More informationSOUTH TEXAS ELECTRIC COOPERATIVE, INC.
SOUTH TEXAS ELECTRIC COOPERATIVE, INC. P.O. Box 119 Nursery, Texas 77976 (361) 575-6491 Fax (361) 576-1433 Transmission Interconnection Requirements Table of Contents I. Introduction II. Interconnection
More informationCertification Program
Certification Program Ryan Stewart, Manager of Registration, NERC FRCC Reliability Performance Workshop September 20, 2017 Purpose of the Certification Program Rules of Procedure (ROP) Section 500: The
More informationProject Physical Security Directives Mapping Document
Document Background In Order No. 802 (final order on CIP-014-1 Physical Security), issued on November 20, 2014, FERC directed NERC to remove the term widespread from Reliability Standard CIP-014-1 or,
More informationAnalysis of EMS Outages
Analysis of EMS Outages Venkat Tirupati, LCRA, Supervisor EMS SW & Advanced Applications NERC 3 rd Annual Monitoring and Situational Awareness Conference September 29-30, 2015 Agenda Introduction Common
More informationBulk Electric System Definition Changes and Reporting
Bulk Electric System Definition Changes and Reporting June 12, 2014 Greg Sorenson, PE Senior Compliance Engineer gsorenson.re@spp.org 501.688.1713 Overview BES Definition Change BES Definition Reference
More informationCritical Cyber Asset Identification Security Management Controls
Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationCIP Cyber Security Configuration Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationREAL-TIME MONITORING DATA SPECIFICATION
REAL-TIME MONITORING DATA SPECIFICATION Version 1 December 9, 2016 Revision History Version Date Reviewer Revisions 1 11/1/16 Mansion Hudson Initial document 1 Contents 1. DOCUMENT REVIEW... 3 2. DEFINITIONS...
More informationDRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1
DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...
More informationImplementation Plan for Version 5 CIP Cyber Security Standards
Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 17, 2012 Note: On September 17, 2012, NERC was alerted that some references in the Initial Performance of Certain Periodic
More informationReliability Coordinator Procedure
No. Table of Contents Purpose... 1 1. Responsibilities... 2 2. Scope/ Applicability... 2 2.1. Background... 2 2.2. Scope... 2 2.3. Applicability... 3 3. Detail... 3 3.1. Format and Security Protocols...
More informationERO Enterprise Registration Practice Guide: Distribution Provider directly connected Determinations Version 2: July 5, 2018
ERO Enterprise Registration Practice Guide: Distribution Provider directly connected Determinations Version 2: July 5, 2018 Purpose The purpose of this Practice Guide is provide a reference to be used
More informationNERC Transmission Availability Data System (TADS): Element Identifier Data Submission Addendum
Transmission Availability Data System (TADS) Element Identifier Data Submission Addendum May 28, 2013 3353 Peachtree Road NE NERC Transmission Availability Data System (TADS): Element Identifier Data Submission
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationTIGRS REGISTRY REQUIREMENTS FOR QUALIFIED REPORTING ENTITIES
TIGRS REGISTRY REQUIREMENTS FOR QUALIFIED REPORTING ENTITIES February 2018 This document identifies the requirements that must be met in order to be considered a Qualified Reporting Entity (or QRE ) in
More informationThis section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Description of Current Draft
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationGrid Protection Alliance NYISO 2010 Smart Grid Vendor Forum. December 9, 2010
Grid Protection Alliance NYISO 2010 Smart Grid Vendor Forum December 9, 2010 1 Who is GPA? A not-for-profit corporation to support the utility industry The Grid Solutions Division of GPA is an open-source
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationStandard Authorization Request Form
Title of Proposed Standard Cyber Security Request Date May 2, 2003 SAR Requestor Information Name Charles Noble (on behalf of CIPAG) Company Telephone SAR Type (Check box for one of these selections.)
More informationScreening Procedures for Access to ISO Register of Transmission Facilities and Entitlements
Screening Procedures for Access to ISO Register of Transmission Facilities and Entitlements In accordance with the Federal Energy Regulatory Commission (FERC) order issued on January 24, 2003 (as modified
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-6 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the Bulk Electric
More informationDepartment of Finance and Administration Post Office Box 8055
General Information STATE OF ARKANSAS EQUAL OPPORTUNITY EMPLOYER REVENUE DIVISION Individual Income Tax Withholding Branch 7 th and Wolfe Streets, Room 1380 Department of Finance and Administration Post
More informationEEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,
EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, 2008 www.morganlewis.com Overview Reliability Standards Enforcement Framework Critical Infrastructure Protection (CIP)
More informationCIP Cyber Security Critical Cyber Asset Identification. Rationale and Implementation Reference Document
CIP-002-4 Cyber Security Critical Cyber Asset Identification Rationale and Implementation Reference Document NERC Cyber Security Standards Drafting Team for Order 706 December 2010 This document provides
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9834-8 Third edition 2014-08-15 Information technology Procedures for the operation of object identifier registration authorities Part 8: Generation of universally unique
More informationUse Case Create NOMCR
Use Case Create NOMCR COPS.P01ModelManageData_UseCase_CreateNOMCR_V0.9 Name: Create NOMCR for Incremental Model Update Summary: Acronyms: Create Data change file for all additions, deletions or modifications
More informationCIM Base PMU Registry
The Standards Based Integration Company Systems Integration Specialists Company, Inc. CIM Base PMU Registry John Gillerman SISCO, Inc. Tel: +1-732-937-9745 Mobile: +1-732-979-9595 Email: johng@sisconet.com
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 CIP-002-5.1 Cyber Security BES Cyber System Categorization This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR
More informationChapter 3 Editing and Assigning Data Values
Chapter 3 Editing and Assigning Data Values Customized data items are powerful tools for forecasting and for creating what if scenarios. With Standard & Poor s Research Insight, you can assign data values
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-5.1 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals
More informationCase Study: Nairobi County BY: Akoth Ruzuna F19/3911/2008. Supervisor: Mr. D. N. Siriba.
USE OF GIS TO DEPICT POWER INTERRUPTIONS Case Study: Nairobi County BY: Akoth Ruzuna F19/3911/2008 Supervisor: Mr. D. N. Siriba. Background Information Information on scheduled power interruptions is announced
More informationNORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION NARUC Energy Regulatory Partnership Program The Public Services Regulatory Commission of Armenia and The Iowa Utilities Board Janet Amick Senior Utility
More informationIntroduction to Generation Availability Data System (GADS) Wind Reporting
Introduction to Generation Availability Data System (GADS) Wind Reporting Registration and Reporting Fundamentals Donna Pratt, Performance Analysis Manager-Data Analytics NERC Webinar April 26, 2017 Topics
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 PRC-004-3 Protection System Misoperation Identification and Correction This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationGuidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1
Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Revision History Version Effective Date Summary of Revisions
More informationICCP Customer Forum. Inter Control Centre Communication Protocol. Friday 30 th September 2011
ICCP Customer Forum Inter Control Centre Communication Protocol Friday 30 th September 2011 Main Forum Objectives The business driver for ICCP Build a common understanding of ICCP Obtain input from a wide
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9834-8 Second edition 2008-12-15 Information technology Open Systems Interconnection Procedures for the operation
More informationCyber Security Reliability Standards CIP V5 Transition Guidance:
Cyber Security Reliability Standards CIP V5 Transition Guidance: ERO Compliance and Enforcement Activities during the Transition to the CIP Version 5 Reliability Standards To: Regional Entities and Responsible
More informationNERC Request for Data or Information: Protection System Misoperation Data Collection August 14, 2014
Request for Data or Information Protection System Misoperation Data Collection August 14, 2014 3353 Peachtree Road NE Suite 600, North Tower Atlanta, GA 30326 404-446-2560 www.nerc.com 1 of 15 Table of
More informationSystem Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,
TO 8-06: Regional Real-Time Transit Architecture Design, Procurement and Technical Assistance Real-Time Transit Information System System Requirements VERSION 2.5 Prepared for: Metropolitan Transportation
More informationGeneration, Transmission, and End User Facilities
Procedures for Interconnection of Generation, Transmission, and End User To the Grand River Dam Authority Transmission System Table of Contents GRDA/SPP Interaction... 3 Standards... 3 Generation... 3
More informationStandard CIP 005 4a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-4a 3. Purpose: Standard CIP-005-4a requires the identification and protection of the Electronic Security Perimeter(s)
More informationProposed Clean and Redline for Version 2 Implementation Plan
Exhibit A Implementation Plans for CIP-002-2 through CIP-009-2 and CIP-002-3 and CIP-009-3 For Generator Owners and Generator Operators of U.S. Nuclear Power Plants Proposed Clean and Redline for Version
More informationTable of Contents. TOP TOP BA Data Request and Specification Guidelines. Operating Procedure
No. 3140 Table of Contents Purpose... 2 Responsibilities... 2 2. Scope/Applicability... 4 2.1 Background... 4 2.2 Scope / Applicability... 4 3. Detail... 5 3.1... 5 Introduction... 5 3.2 Data Specification
More informationA. Introduction. B. Requirements and Measures
A. Introduction 1. Title: Communications 2. Number: COM-001-3 3. Purpose: To establish Communication capabilities necessary to maintain reliability. 4. Applicability: 4.1. Functional Entities: 4.1.1. Transmission
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 FAC-003-4 Transmission Vegetation Management. Registered Entity Name: Applicable Function(s): Applicable only for TO and GO Compliance Monitoring Method: RSAW Version:
More informationHetch Hetchy Water and Power of the City and County of San Francisco. Joint Transmission Planning Base Case Preparation Process
California Independent System Operator & Hetch Hetchy Water and Power of the City and County of San Francisco Joint Transmission Planning Base Case Preparation Process This is a living document. Please
More informationDRAFT Risks and Mitigations for Losing EMS Functions
DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computer-aided tools used by System Operators to monitor, control, and optimize
More informationStandard CIP 005 2a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)
More informationGuidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID)
Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID) Abstract This tutorial covers organizational identifiers assigned by the IEEE Registration
More informationStandard CIP Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security program
More informationEngineering Recommendation G87 Issue
PRODUCED BY THE OPERATIONS DIRECTORATE OF ENERGY NETWORKS ASSOCIATION Engineering Recommendation G87 Issue 2-2015 Guidelines for the Provision of Low Voltage Connections to Multiple Occupancy Buildings
More informationDraft CIP Standards Version 5
Draft CIP Standards Version 5 Technical Webinar Part 1 Project 2008-06 Cyber Security Order 706 Standards Drafting Team November 15, 2011 Agenda Opening Remarks John Lim, Consolidated Edison, Chair V5
More informationThis draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationProcedure For NPCC Bulk Electric System Asset Database
Procedure For NPCC Bulk Electric System Asset Database Compliance Procedure 09 (CP-09) Revision 2 Table of Contents 1. Introduction and Purpose... 3 2. Responsibilities... 3 3. Overview... 3 4. Asset Database...
More informationUnofficial Comment Form 1st Draft of PRC-005-3: Protection System and Automatic Reclosing Maintenance (Project )
Unofficial Comment Form 1st Draft of PRC-005-3: Protection System and Automatic Reclosing Maintenance (Project 2007-17.2) Please DO NOT use this form for submitting comments. Please use the electronic
More informationISO/IEC 8348 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Network service definition
INTERNATIONAL STANDARD ISO/IEC 8348 Third edition 2002-11-01 Information technology Open Systems Interconnection Network service definition Technologies de l'information Interconnexion des systèmes ouverts
More informationThis section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective.
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationHow to query general person information. Last Updated: 22-Nov-2010
How to query general person information Table of Contents How to view, modify or create a person...3 How to view and modify existing records...4 How to create a new person record...5 How to view, add and
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan
More informationCIP Standards Development Overview
CIP Standards Development Overview CSSDTO706 Meeting with FERC Technical Staff July 28, 2011 Objectives Historical Timeline CIP-002-4 CIP-005-4 CIP Version 5 2 Project 2008-06 Overview FERC Order 706 SDT
More informationCyber Security Standards Drafting Team Update
Cyber Security Standards Drafting Team Update Michael Assante, VP & Chief Security Officer North American Electric Reliability Corp. February 3, 2008 Overview About NERC Project Background Proposed Modifications
More informationEntergy Development and Deployment of IEC Protection and Control Including Process Bus
Entergy Development and Deployment of IEC 61850 Protection and Control Including Process Bus Chan Y. Wong Entergy Transmission Eric A. Udren and Solveig Ward Quanta Technology, LLC Presented at CIGRÉ Grid
More informationINTERNATIONAL STANDARD
ISO/IEC 24775-1 INTERNATIONAL STANDARD Edition 1.0 2014-10 colour inside Information technology Storage management Part 1: Overview INTERNATIONAL ELECTROTECHNICAL COMMISSION PRICE CODE D ICS 35.200 ISBN
More informationISO INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 639-4 First edition 2010-07-15 Codes for the representation of names of languages Part 4: General principles of coding of the representation of names of languages and related
More informationCIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra
CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office
More informationCIP Cyber Security Security Management Controls. Standard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationREGISTRATION DATA INTERFACE SPECIFICATION
REGISTRATION DATA INTERFACE SPECIFICATION DEFINITIONS Data Transfer Catalogue DCC Status DCC Status File Electricity Registration Data Provider FTP FTPS Gas Registration Data Provider Hot Standby Router
More informationThe Narragansett Electric Company. d/b/a National Grid (Rhode Island Reliability Project) RIPUC Dkt. No Testimony of. Todd G. Kopoyan, P.E.
d/b/a National Grid (Rhode Island Reliability Project) RIPUC Dkt. No. 0 Testimony of Todd G. Kopoyan, P.E. February 0, 00 0 0 INTRODUCTION Q. Please state your name and business address. A. My name is
More informationMemorandum. This memorandum requires Board action. EXECUTIVE SUMMARY
California Independent System Operator Corporation Memorandum To: ISO Board of Governors From: Keith Casey, Vice President, Market & Infrastructure Development Date: May 21, 2014 Re: Decision on interconnection
More information